Standard

The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. / Lebedev, Ilya; Krivtsova, Irina; Korzhuk, Viktoria; Bazhayev, Nurzhan; Sukhoparov, Mikhail; Pecherkin, Sergey; Salakhutdinova, Kseniya.

Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 16th International Conference, NEW2AN 2016 and 9th Conference, ruSMART 2016, Proceedings. ed. / Olga Galinina; Yevgeni Koucheryavy; Sergey Balandin. Springer Nature, 2016. p. 503-511 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9870 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Harvard

Lebedev, I, Krivtsova, I, Korzhuk, V, Bazhayev, N, Sukhoparov, M, Pecherkin, S & Salakhutdinova, K 2016, The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. in O Galinina, Y Koucheryavy & S Balandin (eds), Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 16th International Conference, NEW2AN 2016 and 9th Conference, ruSMART 2016, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9870 LNCS, Springer Nature, pp. 503-511, 16th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2016 and 9th conference on Internet of Things and Smart Spaces, ruSMART 2016, St. Petersburg, Russian Federation, 26/09/16. https://doi.org/10.1007/978-3-319-46301-8_42

APA

Lebedev, I., Krivtsova, I., Korzhuk, V., Bazhayev, N., Sukhoparov, M., Pecherkin, S., & Salakhutdinova, K. (2016). The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. In O. Galinina, Y. Koucheryavy, & S. Balandin (Eds.), Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 16th International Conference, NEW2AN 2016 and 9th Conference, ruSMART 2016, Proceedings (pp. 503-511). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9870 LNCS). Springer Nature. https://doi.org/10.1007/978-3-319-46301-8_42

Vancouver

Lebedev I, Krivtsova I, Korzhuk V, Bazhayev N, Sukhoparov M, Pecherkin S et al. The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. In Galinina O, Koucheryavy Y, Balandin S, editors, Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 16th International Conference, NEW2AN 2016 and 9th Conference, ruSMART 2016, Proceedings. Springer Nature. 2016. p. 503-511. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-46301-8_42

Author

Lebedev, Ilya ; Krivtsova, Irina ; Korzhuk, Viktoria ; Bazhayev, Nurzhan ; Sukhoparov, Mikhail ; Pecherkin, Sergey ; Salakhutdinova, Kseniya. / The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 16th International Conference, NEW2AN 2016 and 9th Conference, ruSMART 2016, Proceedings. editor / Olga Galinina ; Yevgeni Koucheryavy ; Sergey Balandin. Springer Nature, 2016. pp. 503-511 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

BibTeX

@inproceedings{07530401ff3b475791c5d1c14a9800b0,
title = "The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring",
abstract = "The wireless network of low-power devices of Smart home and Internet of Things is considered. The signs of unauthorized access are defined. The analysis of the characteristics of systems based on wireless technologies obtained from the experiment results of passive monitoring and active polling of device forming the network infrastructure is conducted. The state-analyzing model based on the identity, quantity, frequency and temporal characteristics is presented. Evaluation of the information security state is focused on analyzing of the system normal functioning profile excluding the search of signatures and characteristics of anomalies under different kinds of attacks. The accumulation of data for decision-making is carried out by comparison of the statistical information of service message from the terminal nodes in passive and active modes. The proposed model can be used to determine the technical characteristics of the devices of wireless ad-hoc networks and to make recommendations concerning the information security state analysis.",
keywords = "Availability of devices, Information security, The model of information security, Vulnerability, Wireless networks of soft spaces",
author = "Ilya Lebedev and Irina Krivtsova and Viktoria Korzhuk and Nurzhan Bazhayev and Mikhail Sukhoparov and Sergey Pecherkin and Kseniya Salakhutdinova",
year = "2016",
month = jan,
day = "1",
doi = "10.1007/978-3-319-46301-8_42",
language = "English",
isbn = "9783319463001",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Nature",
pages = "503--511",
editor = "Olga Galinina and Yevgeni Koucheryavy and Sergey Balandin",
booktitle = "Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 16th International Conference, NEW2AN 2016 and 9th Conference, ruSMART 2016, Proceedings",
address = "Germany",
note = "16th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2016 and 9th conference on Internet of Things and Smart Spaces, ruSMART 2016 ; Conference date: 26-09-2016 Through 28-09-2016",

}

RIS

TY - GEN

T1 - The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring

AU - Lebedev, Ilya

AU - Krivtsova, Irina

AU - Korzhuk, Viktoria

AU - Bazhayev, Nurzhan

AU - Sukhoparov, Mikhail

AU - Pecherkin, Sergey

AU - Salakhutdinova, Kseniya

PY - 2016/1/1

Y1 - 2016/1/1

N2 - The wireless network of low-power devices of Smart home and Internet of Things is considered. The signs of unauthorized access are defined. The analysis of the characteristics of systems based on wireless technologies obtained from the experiment results of passive monitoring and active polling of device forming the network infrastructure is conducted. The state-analyzing model based on the identity, quantity, frequency and temporal characteristics is presented. Evaluation of the information security state is focused on analyzing of the system normal functioning profile excluding the search of signatures and characteristics of anomalies under different kinds of attacks. The accumulation of data for decision-making is carried out by comparison of the statistical information of service message from the terminal nodes in passive and active modes. The proposed model can be used to determine the technical characteristics of the devices of wireless ad-hoc networks and to make recommendations concerning the information security state analysis.

AB - The wireless network of low-power devices of Smart home and Internet of Things is considered. The signs of unauthorized access are defined. The analysis of the characteristics of systems based on wireless technologies obtained from the experiment results of passive monitoring and active polling of device forming the network infrastructure is conducted. The state-analyzing model based on the identity, quantity, frequency and temporal characteristics is presented. Evaluation of the information security state is focused on analyzing of the system normal functioning profile excluding the search of signatures and characteristics of anomalies under different kinds of attacks. The accumulation of data for decision-making is carried out by comparison of the statistical information of service message from the terminal nodes in passive and active modes. The proposed model can be used to determine the technical characteristics of the devices of wireless ad-hoc networks and to make recommendations concerning the information security state analysis.

KW - Availability of devices

KW - Information security

KW - The model of information security

KW - Vulnerability

KW - Wireless networks of soft spaces

UR - http://www.scopus.com/inward/record.url?scp=84989932577&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-46301-8_42

DO - 10.1007/978-3-319-46301-8_42

M3 - Conference contribution

AN - SCOPUS:84989932577

SN - 9783319463001

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 503

EP - 511

BT - Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 16th International Conference, NEW2AN 2016 and 9th Conference, ruSMART 2016, Proceedings

A2 - Galinina, Olga

A2 - Koucheryavy, Yevgeni

A2 - Balandin, Sergey

PB - Springer Nature

T2 - 16th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2016 and 9th conference on Internet of Things and Smart Spaces, ruSMART 2016

Y2 - 26 September 2016 through 28 September 2016

ER -

ID: 53919743